US6363365B1 - Mechanism for secure tendering in an open electronic network - Google Patents
Mechanism for secure tendering in an open electronic network Download PDFInfo
- Publication number
- US6363365B1 US6363365B1 US09/207,094 US20709498A US6363365B1 US 6363365 B1 US6363365 B1 US 6363365B1 US 20709498 A US20709498 A US 20709498A US 6363365 B1 US6363365 B1 US 6363365B1
- Authority
- US
- United States
- Prior art keywords
- bid
- proposal
- requester
- proposals
- vendor
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Expired - Lifetime
Links
Images
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/38—Payment protocols; Details thereof
- G06Q20/382—Payment protocols; Details thereof insuring higher security of transaction
- G06Q20/3823—Payment protocols; Details thereof insuring higher security of transaction combining multiple encryption tools for a transaction
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/08—Payment architectures
- G06Q20/085—Payment architectures involving remote charge determination or related payment systems
- G06Q20/0855—Payment architectures involving remote charge determination or related payment systems involving a third party
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/38—Payment protocols; Details thereof
- G06Q20/382—Payment protocols; Details thereof insuring higher security of transaction
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q30/00—Commerce
- G06Q30/06—Buying, selling or leasing transactions
- G06Q30/08—Auctions
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q40/00—Finance; Insurance; Tax strategies; Processing of corporate or income taxes
- G06Q40/04—Trading; Exchange, e.g. stocks, commodities, derivatives or currency exchange
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L12/00—Data switching networks
- H04L12/02—Details
- H04L12/16—Arrangements for providing special services to substations
- H04L12/18—Arrangements for providing special services to substations for broadcast or conference, e.g. multicast
- H04L12/1809—Arrangements for providing special services to substations for broadcast or conference, e.g. multicast for auctioneering devices
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/06—Network architectures or network communication protocols for network security for supporting key management in a packet data network
- H04L63/062—Network architectures or network communication protocols for network security for supporting key management in a packet data network for key distribution, e.g. centrally by trusted party
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/10—Network architectures or network communication protocols for network security for controlling access to devices or network resources
Definitions
- the present invention is directed, in general, to the field of computer networking, and, specifically, to a mechanism that provides secure open tendering in an electronic business environment.
- Computer networks can be classified according to the extent of their security, Open networks, such as the Internet, do not have in place any intentional impediments to the free flow of information. (Network traffic and the limitations of hardware may slow or even stop a transmission, but this is random and unintentional.)
- Businesses or governments may extend their closed network connections to their trading partners (e.g., suppliers) to allow the partners to gain limited access to their internal network resources such as inventory database so that adequate inventory level can be maintained.
- Authentication is to provide a proof to a network that a network entity (e.g., a network user or a network client) is indeed the one whom it claimed to be.
- Encryption is to prevent a network entity from assessing the confidential information for which it is not authorized to access.
- Second party authentication is one way to secure communications between a client and server over an open network.
- One well known trusted third party authentication protocol is the “Kerberos” model developed by MIT. (See for example J. G. Steiner, B. C. Neuman, and J. I. Schiller, “Kerberos:
- the client in order to secure communications to a server, the client first contacts a Key Distribution Centre KDC), by identifying itself and presenting a nonce (a non-repeating identifier), in requesting credentials for use with the particular server.
- KDC Key Distribution Centre
- the KDC assembles a response that includes a session key, the nonce and a ticket.
- the ticket identifies the client, specifies the session key and lists start and expiration times for use of the ticket, and is encrypted by the KDC using a key shared with the server.
- the KDC returns the response to the requesting client which decrypts it, checks the nonce and caches the ticket for future use.
- the client want to communicate with the server, it presents the ticket and a freshly-generated authenticator to the server.
- the server decrypts the ticket using the key it shares with the KDC, and uses the session key from the ticket to verify the client's identity and that the time stamp is current.
- Kerberos is based on Needham-Schroeder's much earlier work on trusted third party protocol: R. M. Needham and M. D. Schroeder, “Using encryption for authentication in large networks of computers,” Communication of the ACM, Vol. 21, No. 21, December 1978, pp. 993-999; and R. M. Needham and M. D. Schroeder, “Authentication Revised,” Operating Systems Review, Vol. 21, No. 1, January 1987, pp. 7.
- Communications can be encrypted, using any of standard or non standard encryption algorithms, such as the algorithms defined in Data Encryption Standard (DES), triple DES, International Data Encryption Algorithm (IDEA), and RC2 and RC4 developed by RSA Data Security Inc.
- DES Data Encryption Standard
- DES Triple DES
- IDEA International Data Encryption Algorithm
- RC2 and RC4 developed by RSA Data Security Inc.
- These encryption algorithms are known as symmetric key encryption algorithms since both sending and receiving parties share the same encryption key.
- the encryption key must be communicated secretly between sending and receiving parties and the key must be kept secretly.
- key management which handles issues such as how keys are created, distributed, stored, and destructed.
- the key management can be a problem, particularly when one client or server has millions of correspondents.
- the distribution and management of the symmetric encryption keys can be a nightmare.
- the invention of public key crypto-systems has resolved this problem.
- the public key crypto-systems are also known as asymmetric key systems since encryption keys are different from decryption keys.
- a public key crypto-system there are a key pair, one is known as the public key, and the other is the private key.
- the public key as by its name is made public so that everyone who wishes to access it can access it.
- the private key is kept secretly. If A wants to encrypt data and sends to B, A first find B's public key and encrypt the data using the public key, then sends the encrypted data to B. B can decrypt the encrypted data using its private key. Since only B knows its private key, there is no others who can decrypt the encrypted data. Therefore, the confidentiality of data is well kept.
- a common approach is to create a symmetric key known as a session key to encrypt data, and to use the public key of the receiving party to encrypt the session key. After receiving the encrypted session key and the encrypted data, the receiving party first decrypts the encrypted session key using its private key. Then, it decrypts the encrypted data using the session key.
- the public key infrastructure PKI
- CA public key issuer
- WO 97/415 for a “System and Method for Secure Network Electronic Payment and Credit Card Collection” of Verifone, Inc., is directed to permitting immediate deployment of a secure payment technology and architecture such as the SET architecture without first establishing a public key encryption infrastructure for use by consumers.
- the system set out in WO97/415 involves three parties, customer, merchant, and payment gateway, and relies heavily on Secure Socket Layer (SSL) to perform the communication and negotiation between the parties. Once PKI is established, it would appear that the system set forth in WO97/415 is no longer required.
- SSL Secure Socket Layer
- tenders received are not opened immediately, but are stored in a secure location (a locked box), often with a trusted third party such as an accounting firm, to be opened after the time for bid submission has closed.
- the challenge in the context of electronic procurement is to provide a secure environment analogous to a “locked box” for receipt of electronic bids, that can be entrusted to a third party, if desired.
- the locked information cannot be accessible to the third party, or to the party inviting tenders, at least until the tender deadline has expired.
- Another object of the invention is to provide an electronic tendering system in which:
- the invention provides a lock box mechanism for safely storing electronic bid proposals submitted by vendors during open tendering over a network.
- the mechanism consists of the following elements: (i) a first encryption key shared only between a vendor and a third party authenticator during the open tendering which is used by the vendor for transforming a bid proposal to an inaccessible form prior to submitting the bid proposal to a bid requester, (ii) means held privately by the bid requester for rendering the bid proposal inaccessible to the third party authenticator following submission by the vendor, and (iii) an electronic repository for storing the submitted bid proposal until expiry of the open tendering.
- the bid requester has direct access to the electronic repository while the third party authenticator does not, and preferably, the bid requester notifies the third party authenticator of receipt of bid proposals.
- the third party authenticator has access to the electronic repository and the bid requester does not. Then, preferably, the bid requester double-encrypts bid proposals it receives using its privately-held encryption key, and forwards the double-encrypted bid proposals on to the third part authenticator for storage.
- the invention also provides a method for providing secure electronic tendering in an open network.
- this method consists of publishing an invitation to tender electronic bid proposals (the invitation includes a requirement to encrypt bid proposals prior to submission using encryption keys generated from a specified authentication source), receiving encrypted bid proposals and rendering their contents inaccessible to the specified authentication source, and, on closure of the tendering, obtaining the encryption keys from the specified authentication source for accessing the bid proposals,
- the method consists of generating an encryption key to a vendor for encrypting a bid proposal to be submitted by the vendor to the bid requester in response to a request, maintaining the vendor encryption key secret until notified of expiry of the open tender, and on the expiry of the open tender, forwarding the encryption key to the bid requester.
- FIG. 1 is a schematic diagram illustrating a typical open tender situation in an electronic environment
- FIG. 2 is a flow diagram illustrating a process for third party authentication in a secure open tendering system according to the preferred embodiment of the invention
- FIG. 3A is a flow diagram continuing from FIG. 2, illustrating one process for securely storing bids received in the tender process until expiry of the tender submission deadline, according to one aspect of the invention.
- FIG. 3B is a flow diagram, similar to FIG. 3A, illustrating an alternate process for securely storing received bids until expiry of the tender submission deadline, according to another aspect of the invention.
- a vendor 100 who wants to be a supplier
- a bid requester 102 such as a government body
- a third party authenticating body 104 a third party authenticating body 104 .
- the present invention is not limited to any particular type of hardware and software support for such a system, provided the party components support network/Internet access and message digest, encryption, and digital signature technologies to assure integrity, privacy, authentication, and non-repudiation of communications between the parties.
- a commercial tendering system for a large organisation is described in commonly assigned application titled “A Token-Based Deadline Enforcement System for Electronic Document submission”, and filed in the Canadian Patent Office on Jan. 30, 1998, as Application No. 2,228,331, (IBM docket number CA998-003).
- a master buyer server operating under a Microsoft Windows NT® operating system collects purchase requisitions from inside the bid requesting organisation, stores the requirements on a document information gateway operating under an IBM RS/6000® operating system behind a gateway with a firewall that protects the network within the organisation from the external network.
- Communications with suppliers and third party authenticators are handled by security software which automatically builds a secure structure before forwarding a message to a supplier over the network, and unpacks the secure structures it receives from the network in order to forward plain messages to other components on the internal network to process.
- the master buyer server publishes invitation; to tender on a tender bulletin board that includes software able to notify external parties (i.e., potential suppliers/vendors) of calls for tender.
- the vendors make bid submissions to the system using submission software operating on PC operating systems with network/Internet access, such as IBM OS/2® Warp, Microsoft Windows® 95, etc.
- Third party authenticators have similar support.
- a bid requester issues an invitation to tender (step 1 ) that sets forth the requirements for tendering.
- One necessary requirement to publish is the time frame in which the tendering process will remain open and bid proposals can be submitted.
- the invitation to tender also includes a requirement that prospective vendor/bidders obtained a proposal identifier (discussed below) prior to submitting a planned bid proposal.
- the proposal identifier accompanies a secret encryption key that the vendor is to use to encrypt the bid proposal prior to submission.
- vendors 100 respond by indicating an intention to submit a tender and requesting authentication to do so (step 2 ).
- the bid requester 102 passes each authentication request on to the third party authenticator 104 (step 3 ), which in turn provides each vendors authentication directly back to that vendor 100 (step 4 ) or indirectly through the bid requester (not shown).
- Vendors 100 can then use their authentications to submit their bid proposals to the bid requester 102 (step 5 ).
- These proposals are kept in a bid cache 106 , that could be located either with the bid requester 102 or the third party 104 , until the closing day of the tender.
- the bid requester 102 or the third party 104 will have enough information to see the contents of the cached tenders, and no vendor has access to the content of any other vendor's bid submission.
- the third party 104 sends the bid requester 102 its information on the tenders, which could constitute the encrypted tenders themselves if the third party hosts the cache (step 7 ), to enable the bid requester 102 to open all bid proposals and selects the successful tender (step 8 ).
- the secure open tendering protocol of the preferred embodiments of the invention is based on a public key infrastructure (PKI), where each party involved in the open tendering has a public encryption key and a digital signature key stored in a public key repository such as an X.500 directory or a public key database. These keys are certified by a Certification Authority (CA).
- PKI public key infrastructure
- CA Certification Authority
- This secure open tendering environment can be implemented by following the process set out in FIGS. 2 and 3.
- the bid requester eg., government agency publishes an invitation to tender through any usual means (block 200 ).
- This can include advertising through non-electronic media such as newspapers, advertising through electronic media such as websites, and notifying known suppliers directly through electronic or non-electronic means.
- a vendor who wishes to respond to the invitation to tender first makes a request to the bid requester for a bid proposal identifier by electronically sending the bid requester a REQUEST_ID message (block 202 ).
- the message contains the date and the vendor's digital signature.
- the bid requester On receipt of the vendor's REQUEST_ID message, the bid requester attempts to verify the vendor's digital signature and date information (block 204 ). Failure to do so results in an error message being returned to the vendor (block 206 ). If the signature and date verify, the bid requester registers the vendor by generating a proposal identifier (block 208 ), which it sends to the third pat authenticator asking for a session key that will be used for encrypting the vendor's bid proposal (block 208 ). This vendor's session key is a shared secret between the vendor and the third party until the tender submission deadline has passed and tendering is closed.
- the third party On receiving the bid requester's message requesting a vendor session key, the third party first verifies the bid requester's digital signature and date information (block 212 , else go to block 214 and return an error message to the bid requester). After this verification, the third party generates the requested vendor session key (block 216 ) and encrypts it using the vendor's public encryption key (block 218 ). The third party returns the encrypted session key to the vendor in a REGISTERED_ID message that also contains the date information and digital signature of the third party. If the third party has direct access to the vendor, then the REGISTERED_ID message is forwarded directly to the vendor (blocks 220 , 226 ). If the third party does not have direct access to the vendor, then the REGISTERED_ID message must be returned to the bid requester (blocks 220 , 222 ), which in turn forwards the message on to the vendor (block 224 ).
- the vendor receives the REGISTERED_ID message generated for it to obtain a proposal identifier, and verifies the digital signature and date information. If the message is from the third party directly (block 230 ), then this verification is for the third party's signature and date information only (block 232 , else go to block 234 and return an error message to the third party). On the other hand, if forwarded by the requester (block 224 ), then both lie third party's and requester's signatures and date information should be verified. (Blocks 226 , else go to block 238 and return an error message to the bid requester). If the signature(s) and date information verify, the vendor then decrypts the encrypted session key provided originally by the third party, by using its public key (block 236 ).
- the vendor generates a bid proposal or tender incorporating into it the proposal identifier (block 239 , and encrypts the proposal using the session key (block 240 ).
- the encrypted proposal message is dated and digitally signed by the vendor, and returned to the bid requester which, on receipt, first verifies the date and signature information (block 242 , else go to block 244 and return an error message to the vendor). Since the bid requester does not have the session key, it cannot read the vendor's bid proposal at this time.
- FIGS. 3A and 3B illustrate alternate methods for securing the bid proposal in an electronic “lock box” until expiry of the bid submission deadline when all bid proposals are opened together.
- the bid requester After verifying the date and vendor's digital signature contained in the proposal message, the bid requester generates a separate session key, called a requester session key, and encrypts the proposal again.
- the requester's session key will not be shared with anyone else, and it will be kept secretly by the bid requester itself.
- a message containing the double-encrypted proposal is dated and digitally signed by the bid requester, and forwarded to the third party (block 300 ) which verifies the date and bid requester's digital signature (block 302 , else go to block 304 and return an error message to the bid requester).
- the third party after verifying the date and digital signature contained in the double-encrypted proposal message, the third party forwards evidence of receipt of the proposal directly to the vendor.
- other systems could be employed for notifying the vendor of timely bid receipt, including sending the receipt directly from the bid requester to the vendor.
- a token-based system where the vendor obtains a time-sensitive token to attach to the bid proposal prior to submitting it, is the subject matter of the above referenced IBM application for “A Token-Based Deadline Enforcement System for Electronic Document submission”;
- the third party stores the proposal in a safe repository or cache until the tender close date (block 308 ).
- the bid requester After the deadline for tender submissions has expired, the bid requester generates an ACCESS_REQUEST message (block 310 ) which it sends to the third party to require the proposals to be delivered.
- the third party encrypts the vendor's session key using the bid requester's public encryption key (block 312 ), and attaches the encrypted session key to the double-encrypted proposal (block 314 ).
- An ACCESS_GRANTED message with the encrypted session key attached to the double-encrypted proposal is dated and digitally signed by the third party, and returned to the bid requester (block 316 ).
- the bid requester After verifying the date and third party signature (block 318 , else go to block 320 and return an error message to the third party), the bid requester uses its own private key to decrypt the vendor's session key which was formerly shared only by the vendor and third party (block 322 ), and which was encrypted by the third party using the bid requester's public key (as discussed in relation to block 312 ). The bid requester then uses the decrypted vendor's session key together with its own secret session key to decrypt the vendor's bid proposal (block 124 ).
- This system can be used whether or not the third party holding the bid proposal until expiry of the submission deadline is a trusted third party.
- An alternative protocol can be derived from the secure open tendering protocol described above in which only a single encryption, rather than double encryption, is used.
- the third party can still be either trusted or untrusted.
- the bid requester After verifying the date and digital signature contained in the proposal message developed following the method of FIG. 2, the bid requester generates a PROPOSAL_RECEIVED message on the encrypted proposal received from the vendor using the proposal identifier and date information of that proposal (block 350 ). The bid requester digitally signs the PROPOSAL_RECEIVED message, and sends it to the third party (block 354 ), while storing the encrypted bid proposal in its own cache (block 352 ). It should be noted that the bid requester does NOT send a copy of the actual encrypted proposal to the third party which holds the vendor's session key for decrypting the proposal. Thus, the third party has no access to the encrypted bid proposal even though it shares the encryption key with the vendor.
- the third party After verifying the date and digital signature contained in the PROPOSAL_RECEIVED message (block 356 , else go to block 358 and return an error message to the bid requester), the third party forwards evidence of bid receipt to the vendor (block 360 ) and keeps the PROPOSAL_RECEIVED message in a safe repository for a future non-repudiation purpose (block 362 ).
- the bid requester After expiry of the tender submission date, the bid requester sends a KEYREQUEST message to the third party to require the vendor's session key to access the vendor's encrypted proposal (block 364 ).
- the third party encrypts the session key shared between the it and the vendor, by using the bid requester's public encryption key (block 366 ).
- a KEY_GRANTED message containing the encrypted session key and the third party's digital signature is sent to the bid requester (block 368 ).
- the bid requester After verifying the date and third party signature in the KEY_GRANTED message (block 370 , else go to block 372 and return an error message to the third party), the bid requester uses its own private key to decrypt the encrypted vendor's session key which was formerly shared only by the vendor and third party (block 374 ), and which was encrypted by the third party using the requester's public key (as discussed in relation to block 366 ). The bid requester then uses the decrypted vendor's session key to decrypt the vendor's bid proposal (block 376 ).
Abstract
Description
Claims (15)
Priority Applications (4)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US09/207,094 US6363365B1 (en) | 1998-05-12 | 1998-12-07 | Mechanism for secure tendering in an open electronic network |
SG1999001938A SG77678A1 (en) | 1998-05-12 | 1999-04-23 | A mechanism for secure tendering in an open electronic network |
JP11981899A JP3251917B2 (en) | 1998-05-12 | 1999-04-27 | Electronic bidding system and electronic bidding method |
GB9910761A GB2339125B (en) | 1998-05-12 | 1999-05-11 | A mechanism for secure tendering in an open electronic network |
Applications Claiming Priority (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CA002237441A CA2237441C (en) | 1998-05-12 | 1998-05-12 | A mechanism for secure tendering in an open electronic network |
US09/207,094 US6363365B1 (en) | 1998-05-12 | 1998-12-07 | Mechanism for secure tendering in an open electronic network |
Publications (1)
Publication Number | Publication Date |
---|---|
US6363365B1 true US6363365B1 (en) | 2002-03-26 |
Family
ID=25680201
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US09/207,094 Expired - Lifetime US6363365B1 (en) | 1998-05-12 | 1998-12-07 | Mechanism for secure tendering in an open electronic network |
Country Status (4)
Country | Link |
---|---|
US (1) | US6363365B1 (en) |
JP (1) | JP3251917B2 (en) |
GB (1) | GB2339125B (en) |
SG (1) | SG77678A1 (en) |
Cited By (124)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20010014869A1 (en) * | 1999-12-03 | 2001-08-16 | Katsumi Yoshizawa | Information processing apparatus, storage medium provided therewith, and information processing method |
US20010018678A1 (en) * | 2000-01-25 | 2001-08-30 | Mitel Corporation | Caching mechanism to optimize a bidding process used to select resources and services |
US20010025267A1 (en) * | 2000-01-14 | 2001-09-27 | Stephen Janiszewski | System and method for facilitating bidding transactions and conducting project management utilizing software metric collection |
US20010027520A1 (en) * | 2000-03-27 | 2001-10-04 | Shigeo Mori | Authentication substitution system and Authentication substitution method |
US20010034682A1 (en) * | 2000-02-15 | 2001-10-25 | Nigel Knight | International banking system and method |
US20020023208A1 (en) * | 2000-08-08 | 2002-02-21 | Jancula Jeffrey John | Internet third-party authentication using electronic tickets |
US20020083019A1 (en) * | 2000-09-11 | 2002-06-27 | Bystrak Eugene Robert | Verifying digital signatures using a postal security device |
US20020095578A1 (en) * | 2000-11-22 | 2002-07-18 | Asahiko Yamada | System, method, and program for ensuring originality |
US20030014631A1 (en) * | 2001-07-16 | 2003-01-16 | Steven Sprague | Method and system for user and group authentication with pseudo-anonymity over a public network |
US20030023500A1 (en) * | 2001-07-30 | 2003-01-30 | International Business Machines Corporation | System and method for buying and selling merchandise |
US20030026432A1 (en) * | 2001-07-31 | 2003-02-06 | Intel Corporation | System and method for enhanced piracy protection in a wireless personal communication device |
US20030061486A1 (en) * | 2000-05-15 | 2003-03-27 | Nifty Corporation | Electronic commerce information processing system and method |
US20030061120A1 (en) * | 2000-05-15 | 2003-03-27 | Nifty Corporation | Order processing system and method |
US20030074330A1 (en) * | 2001-10-11 | 2003-04-17 | Nokia Corporation | Efficient electronic auction schemes with privacy protection |
US20030158808A1 (en) * | 2002-02-19 | 2003-08-21 | Fujitsu Limited | Electronic bidding method for receiving a bidding form from a bidder for a supplied item via a virtual server secured until a bidding due date |
US20030187684A1 (en) * | 2001-07-31 | 2003-10-02 | Claudio Bartolini | Apparatus and method for an automated negotiation |
US20030188161A1 (en) * | 2002-04-01 | 2003-10-02 | Hewlett-Packard Company | Unique and secure identification of a networked computing node |
US20030217288A1 (en) * | 2002-05-15 | 2003-11-20 | Microsoft Corporation | Session key secruity protocol |
US20030220855A1 (en) * | 2002-05-24 | 2003-11-27 | Duc Lam | System and method for payer (buyer) defined electronic invoice exchange |
US20040006531A1 (en) * | 2000-03-24 | 2004-01-08 | Kwan Khai Hee | System and method for conducting an electronic financial asset deposit auction over computer network |
US20040030602A1 (en) * | 2002-06-19 | 2004-02-12 | Rosenquist Edward G. | Computer-implemented method and system for managing supplier access to purchasing and inventory transactions |
US20040030614A1 (en) * | 2002-06-19 | 2004-02-12 | Shields Jay C. | Computer-implemented method and system for managing workload of procurement individuals |
US20040030618A1 (en) * | 2002-06-19 | 2004-02-12 | Rosenquist Edward G. | Computer-implemented method and system of payment of indirect materials |
US20040030724A1 (en) * | 2002-06-19 | 2004-02-12 | Rosenquist Edward G. | Computer-implemented method and system for replenishing material inventories |
US20040039735A1 (en) * | 2002-06-19 | 2004-02-26 | Ross Maria A. | Computer-implemented method and system for performing searching for products and services |
US20040044591A1 (en) * | 2002-06-19 | 2004-03-04 | Gilliland Ramelle L. | Method and system for electronic procurement involving electronic requests for quotation |
US20040044610A1 (en) * | 1996-12-13 | 2004-03-04 | Cantor Fitzgerald, L.P. (Cflp) | Automated auction protocol processor |
US20040054603A1 (en) * | 2002-06-19 | 2004-03-18 | Robin Clinesmith | Computer-implemented method and system for global purchasing |
US20040064381A1 (en) * | 2000-11-07 | 2004-04-01 | Hitachi, Ltd. | Method and system for supplying management and maintenance parts |
US20040078288A1 (en) * | 2002-06-19 | 2004-04-22 | Jill Forbis | Computer-implemented method and system for retroactive pricing for use in order procurement |
US20040083296A1 (en) * | 2002-10-25 | 2004-04-29 | Metral Max E. | Apparatus and method for controlling user access |
US20040096763A1 (en) * | 2002-11-15 | 2004-05-20 | Eastman Kodak Company | Potoconductive material imaging element |
US20040117331A1 (en) * | 2002-10-31 | 2004-06-17 | Lutnick Howard W. | Keyboard trading system |
US20040125957A1 (en) * | 2000-04-11 | 2004-07-01 | Ty Rauber | Method and system for secure distribution |
US20040186805A1 (en) * | 2000-07-01 | 2004-09-23 | Gologorsky Steven Phillip | Sealed-bid auction comprising staged bid publication |
US20040210512A1 (en) * | 1999-04-30 | 2004-10-21 | Espeed, Inc. | Systems and methods for trading |
US6834272B1 (en) * | 1999-08-10 | 2004-12-21 | Yeda Research And Development Company Ltd. | Privacy preserving negotiation and computation |
US20040260921A1 (en) * | 2002-07-18 | 2004-12-23 | Treadwell William S. | Cryptographic method, system and engine for enciphered message transmission |
US20050055304A1 (en) * | 2003-09-10 | 2005-03-10 | Lutnick Howard W. | Trading application program interface |
US6892308B1 (en) * | 1999-04-09 | 2005-05-10 | General Instrument Corporation | Internet protocol telephony security architecture |
US20050108653A1 (en) * | 2003-11-17 | 2005-05-19 | Espeed, Inc. | Customizable trading display of market data |
US20050108079A1 (en) * | 2003-11-17 | 2005-05-19 | Espeed, Inc. | Customizable trading display of market data |
US20050120121A1 (en) * | 2001-03-30 | 2005-06-02 | Microsoft Corporation | Service routing and web integration in a distributed, multi-site user authentication system |
US20050160032A1 (en) * | 1996-12-13 | 2005-07-21 | Cantor Fitzgerald, L.P. | Automated price improvement protocol processor |
US20050182606A1 (en) * | 2001-01-18 | 2005-08-18 | Nippon Telegraph And Telephone Corp. | Method, apparatus and program for quantitative competition and recording medium having recorded thereon the program |
US6938019B1 (en) * | 2000-08-29 | 2005-08-30 | Uzo Chijioke Chukwuemeka | Method and apparatus for making secure electronic payments |
US20050204041A1 (en) * | 2004-03-10 | 2005-09-15 | Microsoft Corporation | Cross-domain authentication |
US20050223216A1 (en) * | 2004-04-02 | 2005-10-06 | Microsoft Corporation | Method and system for recovering password protected private data via a communication network without exposing the private data |
US20050228998A1 (en) * | 2004-04-02 | 2005-10-13 | Microsoft Corporation | Public key infrastructure scalability certificate revocation status validation |
US20050234811A1 (en) * | 1999-02-24 | 2005-10-20 | Herman Joseph A | Method and system for virtual sealed-bid competitions held over a communications network |
US20050240754A1 (en) * | 2004-04-26 | 2005-10-27 | Nokia Corporation | Service interfaces |
US20050273347A1 (en) * | 2004-06-04 | 2005-12-08 | Bank One, Delaware, National Association | Method and system for processing payment items at a central processor |
US20060004670A1 (en) * | 1999-09-24 | 2006-01-05 | Mckenney Mary K | System and method for providing payment services in electronic commerce |
US6986040B1 (en) * | 2000-11-03 | 2006-01-10 | Citrix Systems, Inc. | System and method of exploiting the security of a secure communication channel to secure a non-secure communication channel |
US20060069637A1 (en) * | 2004-09-28 | 2006-03-30 | Lutnick Howard W | Systems and methods for providing neutral price improvement |
US20060089891A1 (en) * | 2004-10-21 | 2006-04-27 | Nigam Rakesh K | System and method for generating expense information |
US20060095374A1 (en) * | 2004-11-01 | 2006-05-04 | Jp Morgan Chase | System and method for supply chain financing |
US20060123227A1 (en) * | 2000-09-08 | 2006-06-08 | Miller Lawrence R | System and method for transparently providing certificate validation and other services within an electronic transaction |
US20060155985A1 (en) * | 2002-11-14 | 2006-07-13 | France Telecom | Method and system with authentication, revocable anonymity and non-repudiation |
US20060179008A1 (en) * | 2000-09-08 | 2006-08-10 | Tallent Guy S Jr | Provision of authorization and other services |
US7107051B1 (en) * | 2000-09-28 | 2006-09-12 | Intel Corporation | Technique to establish wireless session keys suitable for roaming |
US20060218072A1 (en) * | 2005-03-24 | 2006-09-28 | Espeed, Inc. | Systems and methods for protecting against erroneous price entries in the electronic trading of financial and other instruments |
US20060242055A1 (en) * | 1998-12-31 | 2006-10-26 | Walker Jay S | System and method for encouraging competitive participation in an auction |
US20060261159A1 (en) * | 2005-05-23 | 2006-11-23 | Fred Redick | Devices and methods for monitoring transaction data from point-of-sale devices |
US7213149B2 (en) * | 1999-12-02 | 2007-05-01 | Sony Deutschland Gmbh | Message authentication |
US7234158B1 (en) | 2002-04-01 | 2007-06-19 | Microsoft Corporation | Separate client state object and user interface domains |
US20070162387A1 (en) * | 2000-11-06 | 2007-07-12 | Cataline Glen R | System and method for optimized funding of electronic transactions |
US20070228144A1 (en) * | 2000-08-01 | 2007-10-04 | Lee Knackstedt | Processing transactions using a register portion to track transactions |
US20070240202A1 (en) * | 2006-04-07 | 2007-10-11 | Zing Systems, Inc. | Authentication service for facilitating access to services |
US20070244796A1 (en) * | 2006-01-09 | 2007-10-18 | Lutnick Howard W | Systems and methods for establishing first on the follow trading priority in electronic trading systems |
US20080021812A1 (en) * | 2000-08-23 | 2008-01-24 | Demont & Breyer, Llc | Data Processing System That Provides An Auction With Programmable Proxy Bids |
US7356711B1 (en) | 2002-05-30 | 2008-04-08 | Microsoft Corporation | Secure registration |
US20080133401A1 (en) * | 2001-05-09 | 2008-06-05 | Gilbert Andrew C | Systems and methods for controlling traders from manipulating electronic trading markets |
US7424616B1 (en) * | 1999-09-10 | 2008-09-09 | Identrus | System and method for facilitating access by sellers to certificate-related and other services |
US20090083190A1 (en) * | 2005-12-01 | 2009-03-26 | Toshiyuki Isshiki | System and Method for Electronic Bidding |
US20090177591A1 (en) * | 2007-10-30 | 2009-07-09 | Christopher Thorpe | Zero-knowledge proofs in large trades |
US20090182667A1 (en) * | 2006-05-05 | 2009-07-16 | Parkes David C | Practical secrecy-preserving, verifiably correct and trustworthy auctions |
US20090210703A1 (en) * | 2008-01-18 | 2009-08-20 | Epstein William C | Binding a digital certificate to multiple trust domains |
US20090257597A1 (en) * | 2008-04-10 | 2009-10-15 | Microsoft Corporation | Protocol for Protecting Third Party Cryptographic Keys |
US20090327141A1 (en) * | 2007-04-18 | 2009-12-31 | Rabin Michael O | Highly efficient secrecy-preserving proofs of correctness of computation |
US7668363B2 (en) | 1999-05-11 | 2010-02-23 | Jpmorgan Chase Bank, N.A. | Lockbox imaging system |
US7680735B1 (en) | 2000-08-11 | 2010-03-16 | Jpmorgan Chase Bank, N.A. | Trade receivable processing method and apparatus |
US20100076861A1 (en) * | 1999-02-24 | 2010-03-25 | Herman Joseph A | Method and system for virtual sealed-bid competitions held over a communictions network |
US7734545B1 (en) | 2006-06-14 | 2010-06-08 | Jpmorgan Chase Bank, N.A. | Method and system for processing recurring payments |
US7743979B2 (en) | 2004-02-25 | 2010-06-29 | Jpmorgan Chase Bank, N.A. | Method and system for credit card reimbursements for health care transactions |
US20100185863A1 (en) * | 2006-12-01 | 2010-07-22 | Rabin Michael O | Method and apparatus for time-lapse cryptography |
US7766244B1 (en) | 2007-12-31 | 2010-08-03 | Jpmorgan Chase Bank, N.A. | System and method for processing transactions using a multi-account transactions device |
US7783554B1 (en) | 2003-06-03 | 2010-08-24 | BidLocker, LLC | System and method for bid archive and retrieval |
CN101378318B (en) * | 2008-10-08 | 2010-09-15 | 南京邮电大学 | Identification authentication method of open network based on dynamic credible third-party |
US7801814B2 (en) | 2000-11-06 | 2010-09-21 | Jpmorgan Chase Bank, N.A. | System and method for selectable funding of electronic transactions |
US7814003B2 (en) | 2003-12-15 | 2010-10-12 | Jp Morgan Chase | Billing workflow system for crediting charges to entities creating derivatives exposure |
US7822682B2 (en) | 2005-06-08 | 2010-10-26 | Jpmorgan Chase Bank, N.A. | System and method for enhancing supply chain transactions |
US7827603B1 (en) * | 2004-02-13 | 2010-11-02 | Citicorp Development Center, Inc. | System and method for secure message reply |
US7945492B1 (en) | 1998-12-23 | 2011-05-17 | Jpmorgan Chase Bank, N.A. | System and method for integrating trading operations including the generation, processing and tracking of and trade documents |
US8121944B2 (en) | 2004-06-24 | 2012-02-21 | Jpmorgan Chase Bank, N.A. | Method and system for facilitating network transaction processing |
US20120254957A1 (en) * | 2011-03-28 | 2012-10-04 | International Business Machines Corporation | User impersonation/delegation in a token-based authentication system |
US8290863B2 (en) | 2004-07-23 | 2012-10-16 | Jpmorgan Chase Bank, N.A. | Method and system for expediting payment delivery |
US8290862B2 (en) | 2004-07-23 | 2012-10-16 | Jpmorgan Chase Bank, N.A. | Method and system for expediting payment delivery |
US8301529B1 (en) | 2005-11-02 | 2012-10-30 | Jpmorgan Chase Bank, N.A. | Method and system for implementing effective governance of transactions between trading partners |
US8391584B2 (en) | 2008-10-20 | 2013-03-05 | Jpmorgan Chase Bank, N.A. | Method and system for duplicate check detection |
US8447641B1 (en) | 2010-03-29 | 2013-05-21 | Jpmorgan Chase Bank, N.A. | System and method for automatically enrolling buyers into a network |
US8543504B1 (en) | 2011-03-30 | 2013-09-24 | Jpmorgan Chase Bank, N.A. | Systems and methods for automated invoice entry |
US8543503B1 (en) | 2011-03-30 | 2013-09-24 | Jpmorgan Chase Bank, N.A. | Systems and methods for automated invoice entry |
US8566212B2 (en) | 2002-10-31 | 2013-10-22 | Bgc Partners, Inc. | Electronic systems and methods for providing a trading interface with advanced features |
US8589288B1 (en) | 2010-10-01 | 2013-11-19 | Jpmorgan Chase Bank, N.A. | System and method for electronic remittance of funds |
US8622308B1 (en) | 2007-12-31 | 2014-01-07 | Jpmorgan Chase Bank, N.A. | System and method for processing transactions using a multi-account transactions device |
US8630947B1 (en) | 2003-04-04 | 2014-01-14 | Jpmorgan Chase Bank, N.A. | Method and system for providing electronic bill payment and presentment |
US8762270B1 (en) | 2007-08-10 | 2014-06-24 | Jpmorgan Chase Bank, N.A. | System and method for providing supplemental payment or transaction information |
US8768836B1 (en) | 2000-02-18 | 2014-07-01 | Jpmorgan Chase Bank, N.A. | System and method for electronic deposit of a financial instrument by banking customers from remote locations by use of a digital image |
US8805739B2 (en) | 2001-01-30 | 2014-08-12 | Jpmorgan Chase Bank, National Association | System and method for electronic bill pay and presentment |
US8818903B2 (en) | 1999-09-10 | 2014-08-26 | Charles Dulin | Transaction coordinator for digital certificate validation and other services |
US9058626B1 (en) | 2013-11-13 | 2015-06-16 | Jpmorgan Chase Bank, N.A. | System and method for financial services device usage |
US9092447B1 (en) | 2008-10-20 | 2015-07-28 | Jpmorgan Chase Bank, N.A. | Method and system for duplicate detection |
US9130906B1 (en) * | 2014-05-23 | 2015-09-08 | The United States Of America As Represented By The Secretary Of The Navy | Method and apparatus for automated secure one-way data transmission |
US9349144B1 (en) * | 2013-03-14 | 2016-05-24 | Amazon Technologies, Inc. | Auction-based requesting of electronic resources |
US9684889B2 (en) | 1999-02-12 | 2017-06-20 | Identrust, Inc. | System and method for providing certification-related and other services |
US20180276661A1 (en) * | 2017-03-21 | 2018-09-27 | Tora Holdings, Inc. | Systems and Methods to Securely Match Orders by Distributing Data and Processing Across Multiple Segregated Computation Nodes |
CN108959946A (en) * | 2018-07-10 | 2018-12-07 | 林小丽 | Electric bidding document multilayer encipher-decipher method for e-bidding |
CN109033811A (en) * | 2018-07-10 | 2018-12-18 | 林小丽 | Electric bidding document multilayer encrypting and deciphering system for e-bidding |
CN109242449A (en) * | 2018-11-28 | 2019-01-18 | 佛山科学技术学院 | A kind of Government bidding platform based on B/S |
US10311412B1 (en) | 2003-03-28 | 2019-06-04 | Jpmorgan Chase Bank, N.A. | Method and system for providing bundled electronic payment and remittance advice |
US10497016B1 (en) | 2004-06-17 | 2019-12-03 | Jpmorgan Chase Bank, N.A. | Methods and systems for discounts management |
US10972275B1 (en) | 2018-07-17 | 2021-04-06 | Imageware Systems, Inc. | Zero-knowledge, anonymous verification and management using immutable databases such as blockchain |
CN113643012A (en) * | 2021-01-28 | 2021-11-12 | 上海横申软件咨询有限公司 | Message system based on financial scene |
Families Citing this family (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
JP2002049808A (en) * | 2000-08-02 | 2002-02-15 | Toshiba Corp | Method and system for electronic bid |
JP2003058051A (en) * | 2001-08-15 | 2003-02-28 | Ns Solutions Corp | Electronic bidding system |
Citations (8)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US4458109A (en) * | 1982-02-05 | 1984-07-03 | Siemens Corporation | Method and apparatus providing registered mail features in an electronic communication system |
US5491750A (en) | 1993-12-30 | 1996-02-13 | International Business Machines Corporation | Method and apparatus for three-party entity authentication and key distribution using message authentication codes |
US5638446A (en) | 1995-08-28 | 1997-06-10 | Bell Communications Research, Inc. | Method for the secure distribution of electronic files in a distributed environment |
US5850442A (en) * | 1996-03-26 | 1998-12-15 | Entegrity Solutions Corporation | Secure world wide electronic commerce over an open network |
GB2332833A (en) | 1997-12-24 | 1999-06-30 | Interactive Magazines Limited | Secure credit card transactions over the internet |
US6014644A (en) * | 1996-11-22 | 2000-01-11 | Pp International, Inc. | Centrally coordinated communication systems with multiple broadcast data objects and response tracking |
US6055518A (en) * | 1996-02-01 | 2000-04-25 | At&T Corporation | Secure auction systems |
US6161099A (en) * | 1997-05-29 | 2000-12-12 | Muniauction, Inc. | Process and apparatus for conducting auctions over electronic networks |
-
1998
- 1998-12-07 US US09/207,094 patent/US6363365B1/en not_active Expired - Lifetime
-
1999
- 1999-04-23 SG SG1999001938A patent/SG77678A1/en unknown
- 1999-04-27 JP JP11981899A patent/JP3251917B2/en not_active Expired - Fee Related
- 1999-05-11 GB GB9910761A patent/GB2339125B/en not_active Expired - Fee Related
Patent Citations (8)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US4458109A (en) * | 1982-02-05 | 1984-07-03 | Siemens Corporation | Method and apparatus providing registered mail features in an electronic communication system |
US5491750A (en) | 1993-12-30 | 1996-02-13 | International Business Machines Corporation | Method and apparatus for three-party entity authentication and key distribution using message authentication codes |
US5638446A (en) | 1995-08-28 | 1997-06-10 | Bell Communications Research, Inc. | Method for the secure distribution of electronic files in a distributed environment |
US6055518A (en) * | 1996-02-01 | 2000-04-25 | At&T Corporation | Secure auction systems |
US5850442A (en) * | 1996-03-26 | 1998-12-15 | Entegrity Solutions Corporation | Secure world wide electronic commerce over an open network |
US6014644A (en) * | 1996-11-22 | 2000-01-11 | Pp International, Inc. | Centrally coordinated communication systems with multiple broadcast data objects and response tracking |
US6161099A (en) * | 1997-05-29 | 2000-12-12 | Muniauction, Inc. | Process and apparatus for conducting auctions over electronic networks |
GB2332833A (en) | 1997-12-24 | 1999-06-30 | Interactive Magazines Limited | Secure credit card transactions over the internet |
Non-Patent Citations (3)
Title |
---|
"Secure Electronic Sealed-Bid Auction Protocol with Public Key Cryptography", By, Michiharu Kudo, Tokyo Research Laboratory, IBM Japan. |
Bruce Schneier, Applied Cryptography, Second Edition, 1996, John Wiley & Sons,Inc,Chapter 24.5,Kerberos, pp. 566-571.* |
Michiharu Kudo, Secure Electronic Sealed-Bid Auction Protocal with Public Key Cryptography,IEICE Trans. Fundamentals. vol. E81-A,No. 1 Jan. 1198.* |
Cited By (223)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20050160032A1 (en) * | 1996-12-13 | 2005-07-21 | Cantor Fitzgerald, L.P. | Automated price improvement protocol processor |
US20040044610A1 (en) * | 1996-12-13 | 2004-03-04 | Cantor Fitzgerald, L.P. (Cflp) | Automated auction protocol processor |
US9292865B2 (en) | 1996-12-13 | 2016-03-22 | Cantor Fitzgerald, L.P. Cfph, Llc | Dynamic keyboard for trading |
US7945492B1 (en) | 1998-12-23 | 2011-05-17 | Jpmorgan Chase Bank, N.A. | System and method for integrating trading operations including the generation, processing and tracking of and trade documents |
US20060242056A1 (en) * | 1998-12-31 | 2006-10-26 | Walker Jay S | System and method for encouraging competitive participation in an auction |
US20060242055A1 (en) * | 1998-12-31 | 2006-10-26 | Walker Jay S | System and method for encouraging competitive participation in an auction |
US8630916B2 (en) | 1998-12-31 | 2014-01-14 | Inventor Holdings, Llc | System and method for encouraging competitive participation in an auction |
US9684889B2 (en) | 1999-02-12 | 2017-06-20 | Identrust, Inc. | System and method for providing certification-related and other services |
US20050234811A1 (en) * | 1999-02-24 | 2005-10-20 | Herman Joseph A | Method and system for virtual sealed-bid competitions held over a communications network |
US20100076861A1 (en) * | 1999-02-24 | 2010-03-25 | Herman Joseph A | Method and system for virtual sealed-bid competitions held over a communictions network |
US6892308B1 (en) * | 1999-04-09 | 2005-05-10 | General Instrument Corporation | Internet protocol telephony security architecture |
US20080077523A1 (en) * | 1999-04-30 | 2008-03-27 | Fraser Stuart A | Systems and methods for trading |
US8224740B2 (en) | 1999-04-30 | 2012-07-17 | Bgc Partners, Inc. | Systems and methods for trading |
US7552084B2 (en) * | 1999-04-30 | 2009-06-23 | Bgc Partners, Inc. | Systems and methods for trading |
US8229831B2 (en) | 1999-04-30 | 2012-07-24 | Bgc Partners, Inc. | Systems and methods for trading |
US7392214B1 (en) * | 1999-04-30 | 2008-06-24 | Bgc Partners, Inc. | Systems and methods for trading |
US8285614B2 (en) | 1999-04-30 | 2012-10-09 | Bgc Partners, Inc. | Systems and methods for trading |
US20040210512A1 (en) * | 1999-04-30 | 2004-10-21 | Espeed, Inc. | Systems and methods for trading |
US20080071671A1 (en) * | 1999-04-30 | 2008-03-20 | Fraser Stuart A | Systems and methods for trading |
US20100128324A1 (en) * | 1999-05-11 | 2010-05-27 | Jpmorgan Chase Bank, Na | Lockbox imaging system |
US8045784B2 (en) | 1999-05-11 | 2011-10-25 | Jpmorgan Chase Bank, N.A. | Lockbox imaging system |
US7668363B2 (en) | 1999-05-11 | 2010-02-23 | Jpmorgan Chase Bank, N.A. | Lockbox imaging system |
US6834272B1 (en) * | 1999-08-10 | 2004-12-21 | Yeda Research And Development Company Ltd. | Privacy preserving negotiation and computation |
US8818903B2 (en) | 1999-09-10 | 2014-08-26 | Charles Dulin | Transaction coordinator for digital certificate validation and other services |
US7424616B1 (en) * | 1999-09-10 | 2008-09-09 | Identrus | System and method for facilitating access by sellers to certificate-related and other services |
US7765161B2 (en) | 1999-09-24 | 2010-07-27 | Identrust, Inc. | System and method for providing payment services in electronic commerce |
US20060004670A1 (en) * | 1999-09-24 | 2006-01-05 | Mckenney Mary K | System and method for providing payment services in electronic commerce |
US7949875B2 (en) | 1999-12-02 | 2011-05-24 | Sony Deutschland Gmbh | Message authentication |
US20070162757A1 (en) * | 1999-12-02 | 2007-07-12 | Sony Deutschland Gmbh | Message authentication |
US7213149B2 (en) * | 1999-12-02 | 2007-05-01 | Sony Deutschland Gmbh | Message authentication |
US20010014869A1 (en) * | 1999-12-03 | 2001-08-16 | Katsumi Yoshizawa | Information processing apparatus, storage medium provided therewith, and information processing method |
US20010025267A1 (en) * | 2000-01-14 | 2001-09-27 | Stephen Janiszewski | System and method for facilitating bidding transactions and conducting project management utilizing software metric collection |
US20010018678A1 (en) * | 2000-01-25 | 2001-08-30 | Mitel Corporation | Caching mechanism to optimize a bidding process used to select resources and services |
US7676419B2 (en) * | 2000-01-25 | 2010-03-09 | Mitel Networks Corportion | Caching mechanism to optimize a bidding process used to select resources and services |
US7822656B2 (en) | 2000-02-15 | 2010-10-26 | Jpmorgan Chase Bank, N.A. | International banking system and method |
US8924289B1 (en) | 2000-02-15 | 2014-12-30 | Jpmorgan Chase Bank, N.A. | International banking system and method |
US8380597B2 (en) | 2000-02-15 | 2013-02-19 | Jpmorgan Chase Bank, N.A. | International banking system and method |
US20010034682A1 (en) * | 2000-02-15 | 2001-10-25 | Nigel Knight | International banking system and method |
US8768836B1 (en) | 2000-02-18 | 2014-07-01 | Jpmorgan Chase Bank, N.A. | System and method for electronic deposit of a financial instrument by banking customers from remote locations by use of a digital image |
US9946998B1 (en) | 2000-02-18 | 2018-04-17 | Jpmorgan Chase Bank, N.A. | System and method for electronic deposit of a financial instrument by banking customers from remote locations by use of a digital image |
US20040006531A1 (en) * | 2000-03-24 | 2004-01-08 | Kwan Khai Hee | System and method for conducting an electronic financial asset deposit auction over computer network |
US8001035B2 (en) * | 2000-03-24 | 2011-08-16 | Khai Hee Kwan | System and method for conducting an electronic financial asset deposit auction over computer network |
US20010027520A1 (en) * | 2000-03-27 | 2001-10-04 | Shigeo Mori | Authentication substitution system and Authentication substitution method |
US20040125957A1 (en) * | 2000-04-11 | 2004-07-01 | Ty Rauber | Method and system for secure distribution |
US20030061486A1 (en) * | 2000-05-15 | 2003-03-27 | Nifty Corporation | Electronic commerce information processing system and method |
US20030061120A1 (en) * | 2000-05-15 | 2003-03-27 | Nifty Corporation | Order processing system and method |
US7483863B2 (en) | 2000-05-15 | 2009-01-27 | Nifty Corporation | Electronic commerce information processing system and method |
US7310611B2 (en) * | 2000-05-15 | 2007-12-18 | Nifty Corporation | Order processing system and method |
US20080195412A1 (en) * | 2000-07-01 | 2008-08-14 | Demont & Breyer, Llc | Sealed-Bid Auction Comprising Staged Bid Publication |
US20080195526A1 (en) * | 2000-07-01 | 2008-08-14 | Demont & Breyer, Llc | Sealed-Bid Auction Comprising Staged Bid Publication |
US20040186805A1 (en) * | 2000-07-01 | 2004-09-23 | Gologorsky Steven Phillip | Sealed-bid auction comprising staged bid publication |
US20080195411A1 (en) * | 2000-07-01 | 2008-08-14 | Demont & Breyer, Llc | Sealed-Bid Auction Comprising Staged Bid Publication |
US20070228144A1 (en) * | 2000-08-01 | 2007-10-04 | Lee Knackstedt | Processing transactions using a register portion to track transactions |
US20070266238A1 (en) * | 2000-08-08 | 2007-11-15 | Wachovia Corporation | Internet third-party authentication using electronic tickets |
US7266684B2 (en) * | 2000-08-08 | 2007-09-04 | Wachovia Corporation | Internet third-party authentication using electronic tickets |
US20020023208A1 (en) * | 2000-08-08 | 2002-02-21 | Jancula Jeffrey John | Internet third-party authentication using electronic tickets |
US7680735B1 (en) | 2000-08-11 | 2010-03-16 | Jpmorgan Chase Bank, N.A. | Trade receivable processing method and apparatus |
US8065231B1 (en) | 2000-08-11 | 2011-11-22 | Jpmorgan Chase Bank, N.A. | Trade receivable processing method and apparatus |
US20080021812A1 (en) * | 2000-08-23 | 2008-01-24 | Demont & Breyer, Llc | Data Processing System That Provides An Auction With Programmable Proxy Bids |
US20080027852A1 (en) * | 2000-08-23 | 2008-01-31 | Demont & Breyer, Llc | Data Processing System That Provides An Auction With Programmable Proxy Bids |
US20080033868A1 (en) * | 2000-08-23 | 2008-02-07 | Demont & Breyer, Llc | Data Processing System That Provides An Auction With Programmable Proxy Bids |
US6938019B1 (en) * | 2000-08-29 | 2005-08-30 | Uzo Chijioke Chukwuemeka | Method and apparatus for making secure electronic payments |
US7734924B2 (en) | 2000-09-08 | 2010-06-08 | Identrust, Inc. | System and method for transparently providing certificate validation and other services within an electronic transaction |
US20060179008A1 (en) * | 2000-09-08 | 2006-08-10 | Tallent Guy S Jr | Provision of authorization and other services |
US20060123227A1 (en) * | 2000-09-08 | 2006-06-08 | Miller Lawrence R | System and method for transparently providing certificate validation and other services within an electronic transaction |
US8892475B2 (en) | 2000-09-08 | 2014-11-18 | Identrust, Inc. | Provision of authorization and other services |
US20020083019A1 (en) * | 2000-09-11 | 2002-06-27 | Bystrak Eugene Robert | Verifying digital signatures using a postal security device |
US7107051B1 (en) * | 2000-09-28 | 2006-09-12 | Intel Corporation | Technique to establish wireless session keys suitable for roaming |
US6986040B1 (en) * | 2000-11-03 | 2006-01-10 | Citrix Systems, Inc. | System and method of exploiting the security of a secure communication channel to secure a non-secure communication channel |
US20070162387A1 (en) * | 2000-11-06 | 2007-07-12 | Cataline Glen R | System and method for optimized funding of electronic transactions |
US7801814B2 (en) | 2000-11-06 | 2010-09-21 | Jpmorgan Chase Bank, N.A. | System and method for selectable funding of electronic transactions |
US20040064381A1 (en) * | 2000-11-07 | 2004-04-01 | Hitachi, Ltd. | Method and system for supplying management and maintenance parts |
US20020095578A1 (en) * | 2000-11-22 | 2002-07-18 | Asahiko Yamada | System, method, and program for ensuring originality |
US7100045B2 (en) * | 2000-11-22 | 2006-08-29 | Kabushiki Kaisha Toshiba | System, method, and program for ensuring originality |
US7676399B2 (en) * | 2001-01-18 | 2010-03-09 | Nippon Telegraph And Telephone Corporation | Method, apparatus and program for quantitative competition and recording medium having recorded thereon the program |
US20050182606A1 (en) * | 2001-01-18 | 2005-08-18 | Nippon Telegraph And Telephone Corp. | Method, apparatus and program for quantitative competition and recording medium having recorded thereon the program |
US8805739B2 (en) | 2001-01-30 | 2014-08-12 | Jpmorgan Chase Bank, National Association | System and method for electronic bill pay and presentment |
US7810136B2 (en) | 2001-03-30 | 2010-10-05 | Microsoft Corporation | Service routing and web integration in a distributed, multi-site user authentication system |
US20050120121A1 (en) * | 2001-03-30 | 2005-06-02 | Microsoft Corporation | Service routing and web integration in a distributed, multi-site user authentication system |
US10223747B2 (en) | 2001-05-09 | 2019-03-05 | Bgc Partners, Inc. | Controlling traders from manipulating electronic trading markets |
US20090099973A1 (en) * | 2001-05-09 | 2009-04-16 | Gilbert Andrew C | Systems and methods for controlling traders from manipulating electronic trading markets |
US8725623B2 (en) | 2001-05-09 | 2014-05-13 | Bgc Partners, Inc. | Systems and methods for controlling traders from manipulating electronic trading markets |
US20080133401A1 (en) * | 2001-05-09 | 2008-06-05 | Gilbert Andrew C | Systems and methods for controlling traders from manipulating electronic trading markets |
US8738501B2 (en) | 2001-05-09 | 2014-05-27 | Bgc Partners, Inc. | Controlling traders from manipulating electronic trading markets |
US20030014631A1 (en) * | 2001-07-16 | 2003-01-16 | Steven Sprague | Method and system for user and group authentication with pseudo-anonymity over a public network |
US20030023500A1 (en) * | 2001-07-30 | 2003-01-30 | International Business Machines Corporation | System and method for buying and selling merchandise |
US20030187684A1 (en) * | 2001-07-31 | 2003-10-02 | Claudio Bartolini | Apparatus and method for an automated negotiation |
US7836515B1 (en) | 2001-07-31 | 2010-11-16 | Marvell International, Ltd. | System and method for enhanced piracy protection in a wireless personal communication device |
US8561211B1 (en) | 2001-07-31 | 2013-10-15 | Marvell International Ltd. | System and method for enhanced piracy protection in a wireless personal communication device |
US20030026432A1 (en) * | 2001-07-31 | 2003-02-06 | Intel Corporation | System and method for enhanced piracy protection in a wireless personal communication device |
US8185965B1 (en) | 2001-07-31 | 2012-05-22 | Marvell International Ltd. | System and method for enhanced piracy protection in a wireless personal communication device |
US7257844B2 (en) * | 2001-07-31 | 2007-08-14 | Marvell International Ltd. | System and method for enhanced piracy protection in a wireless personal communication device |
US20030074330A1 (en) * | 2001-10-11 | 2003-04-17 | Nokia Corporation | Efficient electronic auction schemes with privacy protection |
US20030158808A1 (en) * | 2002-02-19 | 2003-08-21 | Fujitsu Limited | Electronic bidding method for receiving a bidding form from a bidder for a supplied item via a virtual server secured until a bidding due date |
US7630920B2 (en) * | 2002-02-19 | 2009-12-08 | Fujitsu Limited | Electronic bidding method for receiving a bidding form from a bidder for a supplied item via a virtual server secured until a bidding due date |
US20030188161A1 (en) * | 2002-04-01 | 2003-10-02 | Hewlett-Packard Company | Unique and secure identification of a networked computing node |
US7234158B1 (en) | 2002-04-01 | 2007-06-19 | Microsoft Corporation | Separate client state object and user interface domains |
US7216226B2 (en) * | 2002-04-01 | 2007-05-08 | Hewlett-Packard Development Company, L.P. | Unique and secure identification of a networked computing node |
US20030217288A1 (en) * | 2002-05-15 | 2003-11-20 | Microsoft Corporation | Session key secruity protocol |
US7523490B2 (en) * | 2002-05-15 | 2009-04-21 | Microsoft Corporation | Session key security protocol |
US7971240B2 (en) | 2002-05-15 | 2011-06-28 | Microsoft Corporation | Session key security protocol |
US7689482B2 (en) | 2002-05-24 | 2010-03-30 | Jp Morgan Chase Bank, N.A. | System and method for payer (buyer) defined electronic invoice exchange |
US8401939B2 (en) | 2002-05-24 | 2013-03-19 | Jpmorgan Chase Bank, N.A. | System and method for payer (buyer) defined electronic invoice exchange |
US20030220855A1 (en) * | 2002-05-24 | 2003-11-27 | Duc Lam | System and method for payer (buyer) defined electronic invoice exchange |
US20100145839A1 (en) * | 2002-05-24 | 2010-06-10 | Duc Lam | System and method for payer (buyer) defined electronic invoice exchange |
US7356711B1 (en) | 2002-05-30 | 2008-04-08 | Microsoft Corporation | Secure registration |
US20040030602A1 (en) * | 2002-06-19 | 2004-02-12 | Rosenquist Edward G. | Computer-implemented method and system for managing supplier access to purchasing and inventory transactions |
US20040044591A1 (en) * | 2002-06-19 | 2004-03-04 | Gilliland Ramelle L. | Method and system for electronic procurement involving electronic requests for quotation |
US20040030614A1 (en) * | 2002-06-19 | 2004-02-12 | Shields Jay C. | Computer-implemented method and system for managing workload of procurement individuals |
US20040078288A1 (en) * | 2002-06-19 | 2004-04-22 | Jill Forbis | Computer-implemented method and system for retroactive pricing for use in order procurement |
US20040030618A1 (en) * | 2002-06-19 | 2004-02-12 | Rosenquist Edward G. | Computer-implemented method and system of payment of indirect materials |
US7363253B2 (en) | 2002-06-19 | 2008-04-22 | Ford Motor Company | Computer-implemented method and system for retroactive pricing for use in order procurement |
US20040054603A1 (en) * | 2002-06-19 | 2004-03-18 | Robin Clinesmith | Computer-implemented method and system for global purchasing |
US20040030724A1 (en) * | 2002-06-19 | 2004-02-12 | Rosenquist Edward G. | Computer-implemented method and system for replenishing material inventories |
US7698231B2 (en) | 2002-06-19 | 2010-04-13 | Ford Motor Company | Computer-implemented method and system for global purchasing |
US20040039735A1 (en) * | 2002-06-19 | 2004-02-26 | Ross Maria A. | Computer-implemented method and system for performing searching for products and services |
US20040260921A1 (en) * | 2002-07-18 | 2004-12-23 | Treadwell William S. | Cryptographic method, system and engine for enciphered message transmission |
US20040083296A1 (en) * | 2002-10-25 | 2004-04-29 | Metral Max E. | Apparatus and method for controlling user access |
US11068980B2 (en) | 2002-10-31 | 2021-07-20 | Bgc Partners, Inc. | Electronic systems and methods for providing a trading interface with advanced features |
US8930256B2 (en) | 2002-10-31 | 2015-01-06 | Bgc Partners, Inc. | Keyboard trading system |
US11016662B2 (en) | 2002-10-31 | 2021-05-25 | Bgc Partners, Inc. | Keyboard trading system |
US10331344B2 (en) | 2002-10-31 | 2019-06-25 | Bgc Partners, Inc. | Keyboard trading system |
US20040117331A1 (en) * | 2002-10-31 | 2004-06-17 | Lutnick Howard W. | Keyboard trading system |
US8566212B2 (en) | 2002-10-31 | 2013-10-22 | Bgc Partners, Inc. | Electronic systems and methods for providing a trading interface with advanced features |
US20060155985A1 (en) * | 2002-11-14 | 2006-07-13 | France Telecom | Method and system with authentication, revocable anonymity and non-repudiation |
US7840813B2 (en) * | 2002-11-14 | 2010-11-23 | France Telecom | Method and system with authentication, revocable anonymity and non-repudiation |
US20040096763A1 (en) * | 2002-11-15 | 2004-05-20 | Eastman Kodak Company | Potoconductive material imaging element |
US10311412B1 (en) | 2003-03-28 | 2019-06-04 | Jpmorgan Chase Bank, N.A. | Method and system for providing bundled electronic payment and remittance advice |
US8630947B1 (en) | 2003-04-04 | 2014-01-14 | Jpmorgan Chase Bank, N.A. | Method and system for providing electronic bill payment and presentment |
US7783554B1 (en) | 2003-06-03 | 2010-08-24 | BidLocker, LLC | System and method for bid archive and retrieval |
US11556987B2 (en) | 2003-09-10 | 2023-01-17 | Bgc Partners, Inc. | Trading application program interface |
US20050055304A1 (en) * | 2003-09-10 | 2005-03-10 | Lutnick Howard W. | Trading application program interface |
US10937092B2 (en) | 2003-09-10 | 2021-03-02 | Bgc Partners, Inc. | Trading application program interface |
US20050055305A1 (en) * | 2003-09-10 | 2005-03-10 | Lutnick Howard W. | Trading application program interface |
US20050108079A1 (en) * | 2003-11-17 | 2005-05-19 | Espeed, Inc. | Customizable trading display of market data |
US8131626B2 (en) | 2003-11-17 | 2012-03-06 | Bgc Partners, Inc. | Customizable trading display of market data |
US8131625B2 (en) | 2003-11-17 | 2012-03-06 | Bgc Partners, Inc. | Customizable trading display of market data |
US10379701B2 (en) | 2003-11-17 | 2019-08-13 | Bgc Partners, Inc. | Customizable trading display of market data |
US20050108653A1 (en) * | 2003-11-17 | 2005-05-19 | Espeed, Inc. | Customizable trading display of market data |
US8160942B2 (en) | 2003-12-15 | 2012-04-17 | Jp Morgan Chase Bank | Billing workflow system for crediting charges to entities creating derivatives exposure |
US7814003B2 (en) | 2003-12-15 | 2010-10-12 | Jp Morgan Chase | Billing workflow system for crediting charges to entities creating derivatives exposure |
US9369452B1 (en) | 2004-02-13 | 2016-06-14 | Citicorp Credit Services, Inc. (Usa) | System and method for secure message reply |
US8756676B1 (en) | 2004-02-13 | 2014-06-17 | Citicorp Development Center, Inc. | System and method for secure message reply |
US7827603B1 (en) * | 2004-02-13 | 2010-11-02 | Citicorp Development Center, Inc. | System and method for secure message reply |
US7743979B2 (en) | 2004-02-25 | 2010-06-29 | Jpmorgan Chase Bank, N.A. | Method and system for credit card reimbursements for health care transactions |
US20050204041A1 (en) * | 2004-03-10 | 2005-09-15 | Microsoft Corporation | Cross-domain authentication |
US7636941B2 (en) | 2004-03-10 | 2009-12-22 | Microsoft Corporation | Cross-domain authentication |
US8689311B2 (en) | 2004-03-10 | 2014-04-01 | Microsoft Corporation | Cross-domain authentication |
US20110179469A1 (en) * | 2004-03-10 | 2011-07-21 | Microsoft Corporation | Cross-domain authentication |
US7950055B2 (en) | 2004-03-10 | 2011-05-24 | Microsoft Corporation | Cross-domain authentication |
US20100042735A1 (en) * | 2004-03-10 | 2010-02-18 | Microsoft Corporation | Cross-domain authentication |
US7437551B2 (en) | 2004-04-02 | 2008-10-14 | Microsoft Corporation | Public key infrastructure scalability certificate revocation status validation |
US20050228998A1 (en) * | 2004-04-02 | 2005-10-13 | Microsoft Corporation | Public key infrastructure scalability certificate revocation status validation |
US20050223216A1 (en) * | 2004-04-02 | 2005-10-06 | Microsoft Corporation | Method and system for recovering password protected private data via a communication network without exposing the private data |
US7379551B2 (en) | 2004-04-02 | 2008-05-27 | Microsoft Corporation | Method and system for recovering password protected private data via a communication network without exposing the private data |
US20050240754A1 (en) * | 2004-04-26 | 2005-10-27 | Nokia Corporation | Service interfaces |
US20050273347A1 (en) * | 2004-06-04 | 2005-12-08 | Bank One, Delaware, National Association | Method and system for processing payment items at a central processor |
US10497016B1 (en) | 2004-06-17 | 2019-12-03 | Jpmorgan Chase Bank, N.A. | Methods and systems for discounts management |
US11308549B2 (en) | 2004-06-17 | 2022-04-19 | Jpmorgan Chase Bank, N.A. | Methods and systems for discounts management |
US8396798B2 (en) | 2004-06-24 | 2013-03-12 | Jpmorgan Chase Bank, N.A. | Method and system for facilitating network transaction processing |
US8121944B2 (en) | 2004-06-24 | 2012-02-21 | Jpmorgan Chase Bank, N.A. | Method and system for facilitating network transaction processing |
US8290862B2 (en) | 2004-07-23 | 2012-10-16 | Jpmorgan Chase Bank, N.A. | Method and system for expediting payment delivery |
US8290863B2 (en) | 2004-07-23 | 2012-10-16 | Jpmorgan Chase Bank, N.A. | Method and system for expediting payment delivery |
US8301540B2 (en) | 2004-09-28 | 2012-10-30 | Bgc Partners, Inc. | Neutral price improvement |
US20060069637A1 (en) * | 2004-09-28 | 2006-03-30 | Lutnick Howard W | Systems and methods for providing neutral price improvement |
US20060089891A1 (en) * | 2004-10-21 | 2006-04-27 | Nigam Rakesh K | System and method for generating expense information |
US20060095374A1 (en) * | 2004-11-01 | 2006-05-04 | Jp Morgan Chase | System and method for supply chain financing |
US11397987B2 (en) | 2005-03-24 | 2022-07-26 | Bgc Partners, Inc. | Systems and methods for protecting against erroneous price entries in the electronic trading of financial and other instruments |
US10592984B2 (en) | 2005-03-24 | 2020-03-17 | Bgc Partenrs, Inc. | Systems and methods for protecting against erroneous price entries in the electronic trading of financial and other instruments |
US20060218072A1 (en) * | 2005-03-24 | 2006-09-28 | Espeed, Inc. | Systems and methods for protecting against erroneous price entries in the electronic trading of financial and other instruments |
US8219480B2 (en) | 2005-03-24 | 2012-07-10 | Bgc Partners, Inc. | Systems and methods for protecting against erroneous price entries in the electronic trading of financial and other instruments |
US7731084B2 (en) | 2005-05-23 | 2010-06-08 | Seiko Epson Corporation | Devices and methods for monitoring transaction data from point-of-sale devices |
US20060261159A1 (en) * | 2005-05-23 | 2006-11-23 | Fred Redick | Devices and methods for monitoring transaction data from point-of-sale devices |
US7822682B2 (en) | 2005-06-08 | 2010-10-26 | Jpmorgan Chase Bank, N.A. | System and method for enhancing supply chain transactions |
US9020850B1 (en) | 2005-11-02 | 2015-04-28 | Jpmorgan Chase Bank, N.A. | Method and system for implementing effective governance of transactions between trading partners |
US8301529B1 (en) | 2005-11-02 | 2012-10-30 | Jpmorgan Chase Bank, N.A. | Method and system for implementing effective governance of transactions between trading partners |
US10797867B2 (en) * | 2005-12-01 | 2020-10-06 | Nec Corporation | System and method for electronic bidding |
US20090083190A1 (en) * | 2005-12-01 | 2009-03-26 | Toshiyuki Isshiki | System and Method for Electronic Bidding |
US8121929B2 (en) | 2006-01-09 | 2012-02-21 | Bgc Partners, Inc. | Apparatus and methods for automatic trade execution in a trading system |
US8117109B2 (en) | 2006-01-09 | 2012-02-14 | Bgc Partners, Inc. | Systems and methods for establishing first on the follow trading priority in electronic trading systems |
US8229832B2 (en) | 2006-01-09 | 2012-07-24 | Bgc Partners, Inc. | Systems and methods for establishing first on the follow trading priority in electronic trading systems |
US20070244795A1 (en) * | 2006-01-09 | 2007-10-18 | Lutnick Howard W | Systems and methods for establishing first on the follow trading priority in electronic trading systems |
US20070244796A1 (en) * | 2006-01-09 | 2007-10-18 | Lutnick Howard W | Systems and methods for establishing first on the follow trading priority in electronic trading systems |
US20070240202A1 (en) * | 2006-04-07 | 2007-10-11 | Zing Systems, Inc. | Authentication service for facilitating access to services |
US7886343B2 (en) * | 2006-04-07 | 2011-02-08 | Dell Products L.P. | Authentication service for facilitating access to services |
US20110295752A1 (en) * | 2006-05-05 | 2011-12-01 | President And Fellows Of Harvard College | Practical secrecy-preserving, verifiably correct and trustworthy auctions |
US8024274B2 (en) * | 2006-05-05 | 2011-09-20 | President And Fellows Of Harvard College | Practical secrecy-preserving, verifiably correct and trustworthy auctions |
US20090182667A1 (en) * | 2006-05-05 | 2009-07-16 | Parkes David C | Practical secrecy-preserving, verifiably correct and trustworthy auctions |
US7904388B1 (en) | 2006-06-14 | 2011-03-08 | Jpmorgan Chase Bank, N.A. | Method and system for processing recurring payments |
US7734545B1 (en) | 2006-06-14 | 2010-06-08 | Jpmorgan Chase Bank, N.A. | Method and system for processing recurring payments |
US20100185863A1 (en) * | 2006-12-01 | 2010-07-22 | Rabin Michael O | Method and apparatus for time-lapse cryptography |
US8526621B2 (en) | 2006-12-01 | 2013-09-03 | President And Fellows Of Harvard College | Method and apparatus for time-lapse cryptography |
US20090327141A1 (en) * | 2007-04-18 | 2009-12-31 | Rabin Michael O | Highly efficient secrecy-preserving proofs of correctness of computation |
US8762270B1 (en) | 2007-08-10 | 2014-06-24 | Jpmorgan Chase Bank, N.A. | System and method for providing supplemental payment or transaction information |
US20090177591A1 (en) * | 2007-10-30 | 2009-07-09 | Christopher Thorpe | Zero-knowledge proofs in large trades |
US8622308B1 (en) | 2007-12-31 | 2014-01-07 | Jpmorgan Chase Bank, N.A. | System and method for processing transactions using a multi-account transactions device |
US8459562B1 (en) | 2007-12-31 | 2013-06-11 | Jpmorgan Chase Bank, N.A. | System and method for processing transactions using a multi-account transactions device |
US7766244B1 (en) | 2007-12-31 | 2010-08-03 | Jpmorgan Chase Bank, N.A. | System and method for processing transactions using a multi-account transactions device |
US8793487B2 (en) | 2008-01-18 | 2014-07-29 | Identrust, Inc. | Binding a digital certificate to multiple trust domains |
US20090210703A1 (en) * | 2008-01-18 | 2009-08-20 | Epstein William C | Binding a digital certificate to multiple trust domains |
US9003192B2 (en) | 2008-04-10 | 2015-04-07 | Microsoft Technology Licensing, Llc | Protocol for protecting third party cryptographic keys |
US20090257597A1 (en) * | 2008-04-10 | 2009-10-15 | Microsoft Corporation | Protocol for Protecting Third Party Cryptographic Keys |
CN101378318B (en) * | 2008-10-08 | 2010-09-15 | 南京邮电大学 | Identification authentication method of open network based on dynamic credible third-party |
US9092447B1 (en) | 2008-10-20 | 2015-07-28 | Jpmorgan Chase Bank, N.A. | Method and system for duplicate detection |
US8391584B2 (en) | 2008-10-20 | 2013-03-05 | Jpmorgan Chase Bank, N.A. | Method and system for duplicate check detection |
US8639017B1 (en) | 2008-10-20 | 2014-01-28 | Jpmorgan Chase Bank, N.A. | Method and system for duplicate check detection |
US8447641B1 (en) | 2010-03-29 | 2013-05-21 | Jpmorgan Chase Bank, N.A. | System and method for automatically enrolling buyers into a network |
US8589288B1 (en) | 2010-10-01 | 2013-11-19 | Jpmorgan Chase Bank, N.A. | System and method for electronic remittance of funds |
US9497184B2 (en) * | 2011-03-28 | 2016-11-15 | International Business Machines Corporation | User impersonation/delegation in a token-based authentication system |
US20120254957A1 (en) * | 2011-03-28 | 2012-10-04 | International Business Machines Corporation | User impersonation/delegation in a token-based authentication system |
US8543504B1 (en) | 2011-03-30 | 2013-09-24 | Jpmorgan Chase Bank, N.A. | Systems and methods for automated invoice entry |
US8543503B1 (en) | 2011-03-30 | 2013-09-24 | Jpmorgan Chase Bank, N.A. | Systems and methods for automated invoice entry |
US9349144B1 (en) * | 2013-03-14 | 2016-05-24 | Amazon Technologies, Inc. | Auction-based requesting of electronic resources |
US9460469B1 (en) | 2013-11-13 | 2016-10-04 | Jpmorgan Chase Bank, N.A. | System and method for financial services device usage |
US9058626B1 (en) | 2013-11-13 | 2015-06-16 | Jpmorgan Chase Bank, N.A. | System and method for financial services device usage |
US9130906B1 (en) * | 2014-05-23 | 2015-09-08 | The United States Of America As Represented By The Secretary Of The Navy | Method and apparatus for automated secure one-way data transmission |
US20180276661A1 (en) * | 2017-03-21 | 2018-09-27 | Tora Holdings, Inc. | Systems and Methods to Securely Match Orders by Distributing Data and Processing Across Multiple Segregated Computation Nodes |
US11068982B2 (en) * | 2017-03-21 | 2021-07-20 | Tora Holdings, Inc. | Systems and methods to securely match orders by distributing data and processing across multiple segregated computation nodes |
CN108959946A (en) * | 2018-07-10 | 2018-12-07 | 林小丽 | Electric bidding document multilayer encipher-decipher method for e-bidding |
CN109033811A (en) * | 2018-07-10 | 2018-12-18 | 林小丽 | Electric bidding document multilayer encrypting and deciphering system for e-bidding |
US10972275B1 (en) | 2018-07-17 | 2021-04-06 | Imageware Systems, Inc. | Zero-knowledge, anonymous verification and management using immutable databases such as blockchain |
CN109242449A (en) * | 2018-11-28 | 2019-01-18 | 佛山科学技术学院 | A kind of Government bidding platform based on B/S |
CN113643012A (en) * | 2021-01-28 | 2021-11-12 | 上海横申软件咨询有限公司 | Message system based on financial scene |
Also Published As
Publication number | Publication date |
---|---|
GB2339125B (en) | 2003-06-18 |
JP3251917B2 (en) | 2002-01-28 |
GB2339125A (en) | 2000-01-12 |
GB9910761D0 (en) | 1999-07-07 |
SG77678A1 (en) | 2001-01-16 |
JP2000029973A (en) | 2000-01-28 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US6363365B1 (en) | Mechanism for secure tendering in an open electronic network | |
US10673632B2 (en) | Method for managing a trusted identity | |
US7003480B2 (en) | GUMP: grand unified meta-protocol for simple standards-based electronic commerce transactions | |
US6308277B1 (en) | Virtual certificate authority | |
Medvinsky et al. | NetCash: A design for practical electronic currency on the Internet | |
US6892300B2 (en) | Secure communication system and method of operation for conducting electronic commerce using remote vault agents interacting with a vault controller | |
KR100455326B1 (en) | Document authentication system and method | |
US6820199B2 (en) | Sending electronic transaction message, digital signature derived therefrom, and sender identity information in AADS system | |
JP5190036B2 (en) | System and method for electronic transmission, storage and retrieval of authenticated documents | |
US7490069B2 (en) | Anonymous payment with a verification possibility by a defined party | |
Ray et al. | A fair-exchange e-commerce protocol with automated dispute resolution | |
US20020049681A1 (en) | Secure anonymous verification, generation and/or proof of ownership of electronic receipts | |
Bhiogade | Secure socket layer | |
JP2004527962A (en) | Non-transferable anonymous electronic receipt | |
Baldwin et al. | Locking the e-safe | |
KR100468031B1 (en) | Publication and settlement of account for an electronic check | |
Yang | The security of electronic banking | |
US20030074321A1 (en) | Method and system for distribution of digital media and conduction of electronic commerce in an un-trusted environment | |
CA2237441C (en) | A mechanism for secure tendering in an open electronic network | |
Kuechler et al. | Digital signatures: A business view | |
Gripman | Electronic document certification: A primer on the technology behind digital signatures | |
Kravitz | Highly scalable on-line payments via task decoupling | |
Kambil | Trends in Electronic Commerce Security: a Managerial Brief and Teaching Note | |
US20020073010A1 (en) | Secure electronic stocks and other titles and instruments | |
JP3250610B2 (en) | How to get fund transfer information |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
AS | Assignment |
Owner name: IBM CORPORATION, NEW YORK Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNOR:KOU, WEIDONG;REEL/FRAME:009639/0650 Effective date: 19981015 |
|
STCF | Information on status: patent grant |
Free format text: PATENTED CASE |
|
FPAY | Fee payment |
Year of fee payment: 4 |
|
FPAY | Fee payment |
Year of fee payment: 8 |
|
AS | Assignment |
Owner name: EBAY INC., CALIFORNIA Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNOR:INTERNATIONAL BUSINESS MACHINES CORPORATION;REEL/FRAME:029532/0211 Effective date: 20120928 |
|
FPAY | Fee payment |
Year of fee payment: 12 |